Pub Date : 2024-02-21DOI: 10.1007/s12243-024-01012-w
Luona Song, Yinglei Teng, Yeyuan Feng, Merveille Nicolas, Jian Zhang
While an increasing number of telecommunications firms are adopting green innovation (GI), research on the conditions under which innovation and collaboration decisions are made is still lacking. This paper proposes a mathematical model integrating innovation level, trust, and knowledge investment dimensions. Innovation and collaboration behaviors are discussed under various scenarios. A simulation is conducted with an evolutionary game theory approach to observe the effect of different parameters on innovation formation. The simulation analysis presents the optimal strategies for each scenario. Research on the green innovation behaviors of telecom operators and the impact of innovation strategies on operations and revenue have reference significance for telecom operators when it comes to selecting favorable innovation strategies, finding suitable partners and forming a relatively stable cooperative relationship in the industrial ecosystem.
{"title":"Game theoretical analysis of green technology innovation partnerships: equipment manufacturers and network operators","authors":"Luona Song, Yinglei Teng, Yeyuan Feng, Merveille Nicolas, Jian Zhang","doi":"10.1007/s12243-024-01012-w","DOIUrl":"https://doi.org/10.1007/s12243-024-01012-w","url":null,"abstract":"<p>While an increasing number of telecommunications firms are adopting green innovation (GI), research on the conditions under which innovation and collaboration decisions are made is still lacking. This paper proposes a mathematical model integrating innovation level, trust, and knowledge investment dimensions. Innovation and collaboration behaviors are discussed under various scenarios. A simulation is conducted with an evolutionary game theory approach to observe the effect of different parameters on innovation formation. The simulation analysis presents the optimal strategies for each scenario. Research on the green innovation behaviors of telecom operators and the impact of innovation strategies on operations and revenue have reference significance for telecom operators when it comes to selecting favorable innovation strategies, finding suitable partners and forming a relatively stable cooperative relationship in the industrial ecosystem.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"20 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139920278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Distributed network emulators allow users to perform network evaluation by running large-scale virtual networks over a cluster of fewer machines. While they offer accessible testing environments for researchers to evaluate their contributions and for the community to reproduce its results, their use of limited physical network and compute resources can silently and negatively impact the emulation results. In this paper, we present a methodology that uses linear optimization to extract information about the physical infrastructure from emulation-level packet delay measurements, in order to pinpoint the root causes of emulation inaccuracy with minimal hypotheses. We evaluate the precision of our methodology using numerical simulations and then show how its implementation performs in a real network scenario.
{"title":"Troubleshooting distributed network emulation","authors":"Houssam ElBouanani, Chadi Barakat, Walid Dabbous, Thierry Turletti","doi":"10.1007/s12243-024-01010-y","DOIUrl":"10.1007/s12243-024-01010-y","url":null,"abstract":"<div><p>Distributed network emulators allow users to perform network evaluation by running large-scale virtual networks over a cluster of fewer machines. While they offer accessible testing environments for researchers to evaluate their contributions and for the community to reproduce its results, their use of limited physical network and compute resources can silently and negatively impact the emulation results. In this paper, we present a methodology that uses linear optimization to extract information about the physical infrastructure from emulation-level packet delay measurements, in order to pinpoint the root causes of emulation inaccuracy with minimal hypotheses. We evaluate the precision of our methodology using numerical simulations and then show how its implementation performs in a real network scenario.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 3-4","pages":"227 - 239"},"PeriodicalIF":1.8,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139911182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-16DOI: 10.1007/s12243-024-01014-8
Hareesh Ayanampudi, Ravindra Dhuli
In this paper, a scalable user-centric HC-RAN is taken into consideration, where each remote radio head (RRH) serves user equipments (UEs) over the same time/frequency resources by using time division duplex (TDD) mode. Network scalability results in the front-haul load and computational complexity at the baseband unit (BBU) pool remaining constant irrespective of the number of UEs in the network. During the channel estimation phase, each RRH will acquire the channel state information (CSI) based on the received pilot signals from the UEs. With the available CSI, each RRH will decode/precode the desired UE information in uplink and downlink, respectively. However, in ultra-dense networks, pilot contamination is a major limitation that hugely impacts the system’s performance. To address this, we proposed an uplink pilot power optimization algorithm by considering the inter-user interference due to pilot sharing and RRH selection. In this algorithm, the pilot power coefficients are designed in such a way as to decrease the mean square error (MSE) of the channel estimates. To achieve this, we used the successive convex approximation method. Moreover, we derived a closed-form expression for achievable spectral efficiency (SE) per UE, which will be valid for any pilot/data power optimization and RRH selection scheme. The results show that the proposed algorithm significantly improves the system performance in the channel estimation phase and will be more suitable for urban environments.
{"title":"Pilot power optimization in scalable user-centric HC-RANs for future IoT and IIoT applications","authors":"Hareesh Ayanampudi, Ravindra Dhuli","doi":"10.1007/s12243-024-01014-8","DOIUrl":"https://doi.org/10.1007/s12243-024-01014-8","url":null,"abstract":"<p>In this paper, a scalable user-centric HC-RAN is taken into consideration, where each remote radio head (RRH) serves user equipments (UEs) over the same time/frequency resources by using time division duplex (TDD) mode. Network scalability results in the front-haul load and computational complexity at the baseband unit (BBU) pool remaining constant irrespective of the number of UEs in the network. During the channel estimation phase, each RRH will acquire the channel state information (CSI) based on the received pilot signals from the UEs. With the available CSI, each RRH will decode/precode the desired UE information in uplink and downlink, respectively. However, in ultra-dense networks, pilot contamination is a major limitation that hugely impacts the system’s performance. To address this, we proposed an uplink pilot power optimization algorithm by considering the inter-user interference due to pilot sharing and RRH selection. In this algorithm, the pilot power coefficients are designed in such a way as to decrease the mean square error (MSE) of the channel estimates. To achieve this, we used the successive convex approximation method. Moreover, we derived a closed-form expression for achievable spectral efficiency (SE) per UE, which will be valid for any pilot/data power optimization and RRH selection scheme. The results show that the proposed algorithm significantly improves the system performance in the channel estimation phase and will be more suitable for urban environments.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"17 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139755092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The sensor nodes in a wireless sensor network are equipped with a limited amount of energy. It is therefore necessary to ensure that the network’s lifespan is extended through efficient use of energy. Using cluster-based routing in wireless sensor networks is one of the most effective ways to deal with energy issues and improve the lifetime of the network. In this paper, an energy-efficient cluster-based routing protocol named Cluster Routing Protocol for Heterogeneous Network (CPHN) is proposed. The proposed CPHN makes use of the initial and residual energy levels of the nodes to select the most energy-efficient node as the cluster head, allowing the wireless sensor network to last longer. The proposed scheme uses the CH selection probability, residual energy, and initial energy of nodes to select the appropriate node as the CH. The simulation result shows that the proposed protocol outperforms various existing clustering protocols in terms of network lifetime, throughput, and stability period.
{"title":"Energy-efficient cluster-based routing protocol for heterogeneous wireless sensor network","authors":"Piyush Rawat, Gopal Singh Rawat, Harish Rawat, Siddhartha Chauhan","doi":"10.1007/s12243-024-01015-7","DOIUrl":"https://doi.org/10.1007/s12243-024-01015-7","url":null,"abstract":"<p>The sensor nodes in a wireless sensor network are equipped with a limited amount of energy. It is therefore necessary to ensure that the network’s lifespan is extended through efficient use of energy. Using cluster-based routing in wireless sensor networks is one of the most effective ways to deal with energy issues and improve the lifetime of the network. In this paper, an energy-efficient cluster-based routing protocol named Cluster Routing Protocol for Heterogeneous Network (CPHN) is proposed. The proposed CPHN makes use of the initial and residual energy levels of the nodes to select the most energy-efficient node as the cluster head, allowing the wireless sensor network to last longer. The proposed scheme uses the CH selection probability, residual energy, and initial energy of nodes to select the appropriate node as the CH. The simulation result shows that the proposed protocol outperforms various existing clustering protocols in terms of network lifetime, throughput, and stability period.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"64 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139755170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-03DOI: 10.1007/s12243-024-01011-x
Vagner E. Quincozes, Silvio E. Quincozes, Diego Passos, Célio Albuquerque, Daniel Mossé
Digital electrical substations are fundamental in providing a reliable basis for smart grids. However, the deployment of the IEC–61850 standards for communication between intelligent electronic devices (IEDs) brings new security challenges. Intrusion detection systems (IDSs) play a vital role in ensuring the proper function of digital substations services. However, the current literature lacks efficient IDS solutions for certain classes of attacks, such as the masquerade attack. In this work, we propose the extraction and correlation of relevant multi-layer information through a feature engineering process to enable the deployment of machine learning-based IDSs in digital substations. Our results demonstrate that the proposed solution can detect attacks that are considered challenging in the literature, attaining an F1-score of up to 95.6% in the evaluated scenarios.
{"title":"Towards feature engineering for intrusion detection in IEC–61850 communication networks","authors":"Vagner E. Quincozes, Silvio E. Quincozes, Diego Passos, Célio Albuquerque, Daniel Mossé","doi":"10.1007/s12243-024-01011-x","DOIUrl":"10.1007/s12243-024-01011-x","url":null,"abstract":"<div><p>Digital electrical substations are fundamental in providing a reliable basis for smart grids. However, the deployment of the IEC–61850 standards for communication between intelligent electronic devices (IEDs) brings new security challenges. Intrusion detection systems (IDSs) play a vital role in ensuring the proper function of digital substations services. However, the current literature lacks efficient IDS solutions for certain classes of attacks, such as the masquerade attack. In this work, we propose the extraction and correlation of relevant multi-layer information through a feature engineering process to enable the deployment of machine learning-based IDSs in digital substations. Our results demonstrate that the proposed solution can detect attacks that are considered challenging in the literature, attaining an F1-score of up to 95.6% in the evaluated scenarios.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 7-8","pages":"537 - 551"},"PeriodicalIF":1.8,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139668118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-03DOI: 10.1007/s12243-023-01008-y
Javier Jose Diaz Rivera, Waleed Akbar, Talha Ahmed Khan, Afaq Muhammad, Wang-Cheol Song
In today’s interconnected world, the line that separates the network perimeter can no longer be identified. This has led to the development of Zero Trust Networking (ZTN) and Software Defined Perimeter (SDP) concepts, which aim to extend the perimeter of trust to every entity connected to the network regardless of their physical location. However, implementing complex security mechanisms and constant trust assurance for every interaction can be challenging. One solution is integrating blockchain technology into Zero Trust to provide security. Blockchain offers features such as data decentralization, anonymity, cryptography, and immutable record of transactions that can be utilized. This work proposes a mechanism for secure service session management using blockchain capabilities. Non-fungible tokens (NFT) are applied to access and provider tokens representing a policy agreement for service consumption. These tokens are mapped to the public addresses of entities registered in the blockchain. The proposal is realized through an open-source Zero Trust platform and a private Ethereum blockchain.
{"title":"Zt &t: secure service session management using blockchain-based tokens in zero trust networks.","authors":"Javier Jose Diaz Rivera, Waleed Akbar, Talha Ahmed Khan, Afaq Muhammad, Wang-Cheol Song","doi":"10.1007/s12243-023-01008-y","DOIUrl":"10.1007/s12243-023-01008-y","url":null,"abstract":"<div><p>In today’s interconnected world, the line that separates the network perimeter can no longer be identified. This has led to the development of Zero Trust Networking (ZTN) and Software Defined Perimeter (SDP) concepts, which aim to extend the perimeter of trust to every entity connected to the network regardless of their physical location. However, implementing complex security mechanisms and constant trust assurance for every interaction can be challenging. One solution is integrating blockchain technology into Zero Trust to provide security. Blockchain offers features such as data decentralization, anonymity, cryptography, and immutable record of transactions that can be utilized. This work proposes a mechanism for secure service session management using blockchain capabilities. Non-fungible tokens (NFT) are applied to access and provider tokens representing a policy agreement for service consumption. These tokens are mapped to the public addresses of entities registered in the blockchain. The proposal is realized through an open-source Zero Trust platform and a private Ethereum blockchain.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 7-8","pages":"487 - 505"},"PeriodicalIF":1.8,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139668700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-11DOI: 10.1007/s12243-023-01009-x
Juan José López Escobar, Rebeca P. Díaz-Redondo, Felipe Gil-Castiñeira
The advent of new computing and communication trends that link pervasive data sources and consumers, such as Edge Computing, 5G and IIoT, has led to the development of the Cloud-to-Edge Continuum in order to take advantage of the resources available in massive IoT scenarios and to conduct data analysis to leverage intelligence at all levels. This paper outlines the challenging requirements of this novel IoT context and presents an innovative IoT framework to develop dataflow applications for data-centric environments. The proposed design takes advantage of decentralized Pub/Sub communication and serverless nanoservice architecture, using novel technologies such as Zenoh and WebAssembly, respectively, to implement lightweight services along the Cloud-to-Edge infrastructure. We also describe some use cases to illustrate the benefits and concerns of the coming IoT generation, giving a communication performance comparison of Zenoh over brokered MQTT strategies.
{"title":"Unleashing the power of decentralized serverless IoT dataflow architecture for the Cloud-to-Edge Continuum: a performance comparison","authors":"Juan José López Escobar, Rebeca P. Díaz-Redondo, Felipe Gil-Castiñeira","doi":"10.1007/s12243-023-01009-x","DOIUrl":"10.1007/s12243-023-01009-x","url":null,"abstract":"<p>The advent of new computing and communication trends that link pervasive data sources and consumers, such as Edge Computing, 5G and IIoT, has led to the development of the Cloud-to-Edge Continuum in order to take advantage of the resources available in massive IoT scenarios and to conduct data analysis to leverage intelligence at all levels. This paper outlines the challenging requirements of this novel IoT context and presents an innovative IoT framework to develop dataflow applications for data-centric environments. The proposed design takes advantage of decentralized Pub/Sub communication and serverless nanoservice architecture, using novel technologies such as Zenoh and WebAssembly, respectively, to implement lightweight services along the Cloud-to-Edge infrastructure. We also describe some use cases to illustrate the benefits and concerns of the coming IoT generation, giving a communication performance comparison of Zenoh over brokered MQTT strategies.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 3-4","pages":"135 - 148"},"PeriodicalIF":1.8,"publicationDate":"2024-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-023-01009-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139438114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-09DOI: 10.1007/s12243-023-01005-1
Nathanael Denis, Sophie Chabridon, Maryline Laurent
The Internet of Things (IoT) is bringing new ways to collect and analyze data to develop applications answering or anticipating users’ needs. These data may be privacy-sensitive, requiring efficient privacy-preserving mechanisms. The IoT is a distributed system of unprecedented scale, creating challenges for performance and security. Classic blockchains could be a solution by providing decentralization and strong security guarantees. However, they are not efficient and scalable enough for large scale IoT systems, and available tools designed for preserving privacy in blockchains, e.g. coin mixing, have a limited effect due to high transaction costs and insufficient transaction rates. This article provides a framework based on several technologies to address the requirements of privacy, security and performance of the Internet of Things. The basis of the framework is the IOTA technology, a derivative of blockchains relying on a directed acyclic graph to create transactions instead of a linear chain. IOTA improves distributed ledger performance by increasing transaction throughput as more users join the network, making the network scalable. As IOTA is not designed for privacy protection, we complement it with privacy-preserving mechanisms: merge avoidance and decentralized mixing. Finally, privacy is reinforced by introducing usage control mechanisms for users to monitor the use and dissemination of their data. A Proof of Concept is proposed to demonstrate the feasibility of the proposed framework. Performance tests are conducted on this Proof of Concept, showing the framework can work on resource-constrained devices and within a reasonable time. The originality of this contribution is also to integrate an IOTA node within the usage control system, to support privacy as close as possible to the objects that need it.
{"title":"Bringing privacy, security and performance to the Internet of Things using IOTA and usage control","authors":"Nathanael Denis, Sophie Chabridon, Maryline Laurent","doi":"10.1007/s12243-023-01005-1","DOIUrl":"10.1007/s12243-023-01005-1","url":null,"abstract":"<div><p>The Internet of Things (IoT) is bringing new ways to collect and analyze data to develop applications answering or anticipating users’ needs. These data may be privacy-sensitive, requiring efficient privacy-preserving mechanisms. The IoT is a distributed system of unprecedented scale, creating challenges for performance and security. Classic blockchains could be a solution by providing decentralization and strong security guarantees. However, they are not efficient and scalable enough for large scale IoT systems, and available tools designed for preserving privacy in blockchains, e.g. coin mixing, have a limited effect due to high transaction costs and insufficient transaction rates. This article provides a framework based on several technologies to address the requirements of privacy, security and performance of the Internet of Things. The basis of the framework is the IOTA technology, a derivative of blockchains relying on a directed acyclic graph to create transactions instead of a linear chain. IOTA improves distributed ledger performance by increasing transaction throughput as more users join the network, making the network scalable. As IOTA is not designed for privacy protection, we complement it with privacy-preserving mechanisms: merge avoidance and decentralized mixing. Finally, privacy is reinforced by introducing usage control mechanisms for users to monitor the use and dissemination of their data. A Proof of Concept is proposed to demonstrate the feasibility of the proposed framework. Performance tests are conducted on this Proof of Concept, showing the framework can work on resource-constrained devices and within a reasonable time. The originality of this contribution is also to integrate an IOTA node within the usage control system, to support privacy as close as possible to the objects that need it.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 7-8","pages":"585 - 601"},"PeriodicalIF":1.8,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139411438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-09DOI: 10.1007/s12243-023-01006-0
Ahmed Zebouchi, Youcef Aklouf
The Internet of Things (IoT) is an emerging technology expected to play a significant role. The integration of IoT with cloud computing (CC) has enabled the creation of large-scale networks of interconnected smart devices and services. To provide optimal quality of service (QoS) for users, it is necessary to address the conflicting requirements of IoT services. The service selection problem is considered NP-hard and therefore requires using metaheuristic algorithms for efficient resolution. This paper presents a novel hybrid multi-objective metaheuristic, pRTMNSGA-III, which combines the strengths of RNSGA-III and TMNSGA-III to generate solutions that meet user preferences and eliminate unfavorable ones. To further optimize computational time, a parallel solution evaluation approach is employed. In addition, a more effective fuzzy membership function is proposed to select the best solution based on the requester’s preferred QoS. The proposed algorithm is evaluated on multiple datasets, and the results demonstrate its superiority over existing state-of-the-art algorithms, including RNSGA-III, TMNSGA-III, NSGA-III, pNSGA-II, NSGA-II, and NSPSO Experimental results demonstrate that pRTMNSGA-III outperforms existing algorithms by up to 37% in terms of the number of non-dominated solutions generated.
{"title":"pRTMNSGA-III: a novel multi-objective algorithm for QoS-aware multi-cloud IoT service selection","authors":"Ahmed Zebouchi, Youcef Aklouf","doi":"10.1007/s12243-023-01006-0","DOIUrl":"https://doi.org/10.1007/s12243-023-01006-0","url":null,"abstract":"<p>The Internet of Things (IoT) is an emerging technology expected to play a significant role. The integration of IoT with cloud computing (CC) has enabled the creation of large-scale networks of interconnected smart devices and services. To provide optimal quality of service (QoS) for users, it is necessary to address the conflicting requirements of IoT services. The service selection problem is considered NP-hard and therefore requires using metaheuristic algorithms for efficient resolution. This paper presents a novel hybrid multi-objective metaheuristic, pRTMNSGA-III, which combines the strengths of RNSGA-III and TMNSGA-III to generate solutions that meet user preferences and eliminate unfavorable ones. To further optimize computational time, a parallel solution evaluation approach is employed. In addition, a more effective fuzzy membership function is proposed to select the best solution based on the requester’s preferred QoS. The proposed algorithm is evaluated on multiple datasets, and the results demonstrate its superiority over existing state-of-the-art algorithms, including RNSGA-III, TMNSGA-III, NSGA-III, pNSGA-II, NSGA-II, and NSPSO Experimental results demonstrate that pRTMNSGA-III outperforms existing algorithms by up to 37% in terms of the number of non-dominated solutions generated.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"16 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139411442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-08DOI: 10.1007/s12243-023-01007-z
Vuppula Roopa, Himansu Shekhar Pradhan
In this article, we implemented a novel blockchain-oriented RAN (BRAN) by allowing multiple players to trade RAN utilities (such as infrastructure) in terms of virtual network functions (VNFs) that are autonomous and dynamic. Particularly, we designed a multi-player network sharing (MPNS) smart contract which enables the automation of RAN-sharing processes using static or free-marketplace-oriented paradigms. The simulation results, acquired through auction-based and free-marketplace RAN-sharing methods, were evaluated based on user equipment (UE) capacity, UE satisfaction rate, base station (BS) efficiency, and end-to-end latency parameters. These results were then compared to those of the existing static RAN. It is observed from the simulation results that the performance of the blockchain-oriented free-marketplace RAN-sharing mechanism is 35% more efficient in terms of UE capacity and 40.5% more efficient in terms of UE satisfaction rate when compared to existing static RAN with the increase as the number of players in RAN environments. The proposed BRAN paradigm has spacious applications in 6G wireless networks, where user’s security, capacity, satisfaction rate, and latency are crucial constraints.
在本文中,我们实现了一种新颖的面向区块链的 RAN(BRAN),允许多个参与者以自主和动态的虚拟网络功能(VNF)来交易 RAN 实用程序(如基础设施)。特别是,我们设计了一种多玩家网络共享(MPNS)智能合约,它可以使用静态或面向自由市场的模式实现 RAN 共享流程的自动化。我们根据用户设备(UE)容量、UE 满意率、基站(BS)效率和端到端延迟参数,评估了通过基于拍卖和自由市场的 RAN 共享方法获得的模拟结果。然后将这些结果与现有静态 RAN 的结果进行了比较。从仿真结果可以看出,与现有的静态 RAN 相比,随着 RAN 环境中参与者数量的增加,以区块链为导向的自由市场 RAN 共享机制在 UE 容量方面的效率提高了 35%,在 UE 满意率方面的效率提高了 40.5%。所提出的 BRAN 范式在 6G 无线网络中有着广阔的应用前景,因为用户的安全性、容量、满意率和延迟是 6G 无线网络的关键限制因素。
{"title":"Smart contract implementation on network sharing for 6G wireless networks","authors":"Vuppula Roopa, Himansu Shekhar Pradhan","doi":"10.1007/s12243-023-01007-z","DOIUrl":"https://doi.org/10.1007/s12243-023-01007-z","url":null,"abstract":"<p>In this article, we implemented a novel blockchain-oriented RAN (BRAN) by allowing multiple players to trade RAN utilities (such as infrastructure) in terms of virtual network functions (VNFs) that are autonomous and dynamic. Particularly, we designed a multi-player network sharing (MPNS) smart contract which enables the automation of RAN-sharing processes using static or free-marketplace-oriented paradigms. The simulation results, acquired through auction-based and free-marketplace RAN-sharing methods, were evaluated based on user equipment (UE) capacity, UE satisfaction rate, base station (BS) efficiency, and end-to-end latency parameters. These results were then compared to those of the existing static RAN. It is observed from the simulation results that the performance of the blockchain-oriented free-marketplace RAN-sharing mechanism is 35% more efficient in terms of UE capacity and 40.5% more efficient in terms of UE satisfaction rate when compared to existing static RAN with the increase as the number of players in RAN environments. The proposed BRAN paradigm has spacious applications in 6G wireless networks, where user’s security, capacity, satisfaction rate, and latency are crucial constraints.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"6 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139396868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}